Ethical Hacking: An Introduction
Whenever  term hacker comes before many people consider it as a guy sitting  inside a room or garage with a bottle or beer and a Laptop or Desktop  doing wonders on click of buttons. But the reality check is hacking is  not that easy as portrayed in movies and television and term hacker  doesn't mean a computer criminal.
So here first of all we'll clear all our misconceptions related to words hackers and hacking.
So here first of all we'll clear all our misconceptions related to words hackers and hacking.
From Where This Word Came:
The  word hacking has history in late 1960's, the time when computers were  nothing but mighty pieces of machines and a computer just meant a  machine that can compute. Electrical and Electronics geeks used to  optimize circuits to make any system/circuit work faster, better and  reliably. The job they used to do on circuits was known as hack. With  time computer geeks also started finding way out to optimize their  system to work better so in fact hacking was nothing but always a kind  of reverse engineering. With time in professional world a word hacker  got meaning, a person who is highly skilled in hardware, software and  networking components. Then movies started portraying hackers do only  dirty works and hence today the word hacker has a negative face  according to people. No matter how the word met to a dreadful end a  hacker always had all qualities that was first put forward in its  definition may the be criminal or ethical. Criminal hackers are also  known as Crackers.
Types Of Hackers:
White Hats:  White hat hackers are good guys who use their hacking skills for  defensive purposes. Organizations and industries pay them high salaries  to protect their systems and networks from intrusion.
Black Hats:  Black hats are actually bad guys in filed. Their main job is to breach  security and make money. They make money by using their hacking skills  for offensive purposes.
Grey Hats:  Gray hats are hackers who work for offensive and defensive purposes  depending on situations. They are hired by people to intrude and protect  systems.
Hactivist:  A hacktivist is kinda hacker who thinks hacking can bring out some  social changes and hacks government and organizations to show his  discomfort over some trivial issues.
Suicide Hackers:  Suicide hackers are those who hack for some purpose and  even don't  bother to suffer long term jail due to their activities. They can be bad  as well as good.
Script Kiddie:  A script kiddie is a person who boasts breaking system using scripts  and codes written by others though he hardly knows what the code does.
Phreak:  It is a person who tries to intrude systems for fun or malicious  personal activities. Mostly  they are children of age 12-15 who don't  even know wrong consequences of hacking.
Types Of Hacking:
Local Hacking: This type of hacking is done when a hacker has full access to the system to implant a virus, keylogger and RATs
Remote Hacking: Remote hacking is done on a remote system using Internet.
Social Engineering:  Social Engineering is kinda interacting skill that a hacker uses to  manipulate people giving out sensitive information. Its kinda trick done  using good verbal, social skills and understanding.  
Terminologies Used Under Hacking:
Threat:  A threat is an environment or situation that could lead to a potential  breach of security. Ethical hackers look for and prioritize threats when  performing a security analysis.  
An Exploit:  An exploit is a piece of software that takes advantage of a bug,  glitch, or vulnerability, leading to unauthorized access, privilege  escalation, or denial of service on a computer system.
Vulnerability:  A vulnerability is an existence of a software flaw, logic design, or  implementation error that can lead to an unexpected and undesirable  event executing bad or damaging instructions to the system. In easy word  vulnerability is weakness in system.
Payload: Payload is agent that helps in taking advantage of vulnerability in remote hacking.
Attack: An attack occurs when a system is compromised based on a vulnerability.
Types Of Attack:
1.Operating System Attack
2.Application level Attack
3.Shrink Wrap Code Attack
4.Misconfiguration Attack
Operating  system attack is attack done on specific type of OS. Such attack is  done using flaws in programs and services shipped with OS. Application  level attack is done over faulty coding practices done over software  during its development. Shrink Wrap Code attack are attacks done over  UN-refined scripts used for making task simpler. Last is  misconfiguration attack, it is kinda attack which is done over  mis-configured system or a system with default settings.
Work Of An Ethical Hacker:
Job  of an ethical hacker is to use all his skills and tools used by  malicious hackers to find vulnerabilities in system and then provide it  security against those vulnerabilities.
Conclusion:  At last what I want to tell, nothing happens in clicks of buttons. A  hacker is highly skilled person in field of computing who usually have  ample knowledge about software, hardware, OS, networking and  programming. A hacker may it be criminal or ethical has immense  patience, determination, organization, discipline and persistence. An  attacker may spend months of time planning, analyzing and executing an  attack. This shows his level of dedication to achieve whatever goal  he/she has set. A person can never become a good hacker unless he have  all above qualities.
Note:  Now onwards we will cover hacking as our main stream topic on this  blog. Real hacking is never done over lamers who hardly knows about  security, it is done over a person who is highly skilled as you are. You  can never learn hacking until you do some practical and gain knowledge  about field so now onwards I urge you to perform practicals that will be  now posted on this blog on your own system. Next no tutorial will be  taken as a lamer so they will be in possible higher details, so this may  happen that you may not understand something. Rather than keeping  yourself mum I plea you to please ask whenever you encounter a problem  or get bothered by topic. Whenever I 'll post on hacking I 'll try to  keep a theoretical and one practical tutorial, you are requested to read  both and grasp matter completely. Thanks for visiting and please tell  are you clear with all points discussed or need some explanation on your  difficulty.



 

























 
 
 
 

 
 
2 comments:
He is no scam,i tested him and he delivered a good job,he helped me settle bank loans,he also helped my son upgrade his scores at high school final year which made him graduate successfully and he gave my son free scholarship into the college,all i had to do was to settle the bills for the tools on the job,i used $500 to get a job of over $50000 done all thanks to Walt,he saved me from all my troubles,sharing this is how i can show gratitude in return for all he has done for me and my family
Gmail; Brillianthackers800@gmail.com
Whatsapp number; +1(224)2140835
SSN FULLZ AVAILABLE
Fresh & valid spammed USA SSN+Dob Leads with DL available in bulk & high credit 700+
>>1$ each SSN+DOB
>>3$ each with SSN+DOB+DL
>>5$ each for premium fullz (700+ credit score with replacement guarantee)
Prices are negotiable in bulk order
Serious buyer contact me no time wasters please
Bulk order will be preferable
CONTACT
Telegram > @leadsupplier
ICQ > 752822040
Email > leads.sellers1212@gmail.com
OTHER STUFF YOU CAN GET
SSN+DOB Fullz
CC's with CVV's (vbv & non-vbv)
USA Photo ID'S (Front & back)
All type of Tools & Tutorials available
(Carding, spamming, hacking, scam page, Cash outs, dumps cash outs)
SQL Injector
Premium Accounts (Netflix, Pornhub, etc)
Paypal Logins
Bitcoin Cracker
SMTP Linux Root
DUMPS with pins track 1 and 2
WU & Bank transfers
Socks, rdp's, vpn
Php mailer
Server I.P's
HQ Emails with passwords
All types of tools & tutorials.. & much more
Looking for long term business
For trust full vendor, feel free to contact
CONTACT
Telegram > @leadsupplier
ICQ > 752822040
Email > leads.sellers1212@gmail.com
Post a Comment